CVE-2021-26077 - Broken authentication in Atlassian Connect Spring Boot (ACSB)
Description
Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot version 2.1.4 introduced a regression to query string hash validation in lifecycle endpoints (such as installation), this regression permits an attacker to send authenticated re-installation event to an app using JWTs intended for other endpoints. This is fixed in version 2.1.5.
Note: This is the re-surfacing of CVE-2021-26074 - Broken authentication in Atlassian Connect Spring Boot (ACSB) in 2.1.4
Affected versions
1.1.0 - 2.1.2, 2.1.4
Fixed versions
2.1.3, 2.1.5 and later
Severity
This is an independent assessment and you should evaluate its applicability to your own IT environment.
CVSS v3 score: 9.1 => Critical severity
Exploitability Metrics
Attack Vector | Network |
---|---|
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope Metric
Scope | Changed |
---|
Impact Metrics
Confidentiality | High |
---|---|
Integrity | Low |
Availability | Low |
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L